US8270934B2 - Configuring network settings for a power line networking device - Google Patents
Configuring network settings for a power line networking device Download PDFInfo
- Publication number
- US8270934B2 US8270934B2 US11/584,929 US58492906A US8270934B2 US 8270934 B2 US8270934 B2 US 8270934B2 US 58492906 A US58492906 A US 58492906A US 8270934 B2 US8270934 B2 US 8270934B2
- Authority
- US
- United States
- Prior art keywords
- power line
- wireless network
- key
- network
- homeplug
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 230000006855 networking Effects 0.000 title claims abstract description 80
- 238000000034 method Methods 0.000 claims abstract description 53
- 230000004044 response Effects 0.000 claims abstract description 19
- 238000004891 communication Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 abstract description 32
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 abstract description 13
- 238000006243 chemical reaction Methods 0.000 abstract description 12
- KJLPSBMDOIVXSN-UHFFFAOYSA-N 4-[4-[2-[4-(3,4-dicarboxyphenoxy)phenyl]propan-2-yl]phenoxy]phthalic acid Chemical compound C=1C=C(OC=2C=C(C(C(O)=O)=CC=2)C(O)=O)C=CC=1C(C)(C)C(C=C1)=CC=C1OC1=CC=C(C(O)=O)C(C(O)=O)=C1 KJLPSBMDOIVXSN-UHFFFAOYSA-N 0.000 description 11
- 230000007246 mechanism Effects 0.000 description 9
- 101000666896 Homo sapiens V-type immunoglobulin domain-containing suppressor of T-cell activation Proteins 0.000 description 7
- 102100038282 V-type immunoglobulin domain-containing suppressor of T-cell activation Human genes 0.000 description 7
- IJJVMEJXYNJXOJ-UHFFFAOYSA-N fluquinconazole Chemical compound C=1C=C(Cl)C=C(Cl)C=1N1C(=O)C2=CC(F)=CC=C2N=C1N1C=NC=N1 IJJVMEJXYNJXOJ-UHFFFAOYSA-N 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 2
- 150000003839 salts Chemical class 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B3/00—Line transmission systems
- H04B3/54—Systems for transmission via power distribution lines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/283—Processing of data at an internetworking point of a home automation network
- H04L12/2836—Protocol conversion between an external network and a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B2203/00—Indexing scheme relating to line transmission systems
- H04B2203/54—Aspects of powerline communications not already covered by H04B3/54 and its subgroups
- H04B2203/5429—Applications for powerline communications
- H04B2203/5441—Wireless systems or telephone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B2203/00—Indexing scheme relating to line transmission systems
- H04B2203/54—Aspects of powerline communications not already covered by H04B3/54 and its subgroups
- H04B2203/5429—Applications for powerline communications
- H04B2203/5445—Local network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/284—Home automation networks characterised by the type of medium used
- H04L2012/2841—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/284—Home automation networks characterised by the type of medium used
- H04L2012/2843—Mains power line
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Definitions
- a power line network is a network that utilizes power transmission lines as the physical medium for transmitting data. Configuring each of these networks can be a challenging and time consuming process, especially for the uninitiated.
- a user In order to configure some types of networks, a user must create a profile that includes the network settings used to establish a connection to the network. For instance, wireless networks often require the user to specify a service set identifier (“SSID”) and a wireless network key. These settings, and potentially others, are then stored in a wireless network profile that is utilized by devices when connecting to the network. For users uninitiated with the process of creating a network profile, this process can be confusing and somewhat time consuming.
- SSID service set identifier
- Other types of networks may also require a user to create a profile that includes network settings used to establish a connection to the network.
- power line networks also require a user to create a profile with network settings.
- a user is typically asked to provide at least a network name and a security key for the power line network.
- the process for creating a power line network profile is generally similar to the process for creating a wireless network profile.
- power line network profiles and wireless network profiles are incompatible. Therefore, in the case where both a power line network and a wireless network are utilized, it is necessary to create two different and incompatible network profiles. This can make the process of configuring the networks unnecessarily time consuming.
- a system, apparatus, method, and computer-readable media are provided for configuring a power line networking device.
- wireless network settings are converted into equivalent power line network settings compatible with a power line network.
- the converted settings are then utilized to configure the power line networking device for operation on the power line network.
- only the wireless network settings must be specified.
- the wireless network settings are then are mapped to equivalent wireless network settings that are compatible with the power line network. This allows a user to create one profile containing network settings that can be applied to networking devices on wireless networks and on power line networks, thereby simplifying the process of configuring networking devices on the power line network.
- the power line network may be compatible with the HOMEPLUG networking standard by the HOMEPLUG POWER ALLIANCE.
- HOMEPLUG is a specification for technology that connects devices to each other through the power lines in a home.
- HOMEPLUG-certified products connect personal computers and other devices that use Ethernet, universal serial bus (“USB”), and wireless technologies to the power line via a HOMEPLUG bridge or adapter.
- the HOMEPLUG networking standard includes devices compatible with both the HOMEPLUG 1.0 and HOMEPLUG AV standards.
- the wireless network settings may include a SSID.
- the SSID is converted to a power line equivalent network name.
- the wireless network settings may also include a wireless network key.
- the wireless network key may include a wired equivalent privacy (“WEP”) key, a WI-FI protected access (“WPA”) key, or a WPA version two key.
- WEP wired equivalent privacy
- WPA WI-FI protected access
- WPA version two key a WPA version two key.
- the wireless network key is converted into an equivalent power line network key.
- the power line equivalent network name and power line network key are then utilized to configure networking devices for operation on the power line network.
- the wireless network settings may be transmitted to a power line networking device.
- the power line networking device may then perform the conversion process for converting the wireless network settings into power line network settings.
- the wireless network settings may be converted to power line network settings by a computer in communication with the power line networking device. Once the wireless network settings have been converted to power line network settings, the computer is operative to transmit the converted settings to the power line networking device.
- the computer may convert the wireless network settings to power line network settings and configure the power line networking device with the converted settings in response to detecting that the power line networking device has not been configured for operation with the power line network.
- the above-described subject matter may also be implemented as a computer-controlled apparatus, a computer process, a computing system, or as an article of manufacture such as a computer program product or computer-readable medium.
- the computer program product may be a computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process.
- the computer program product may also be a propagated signal on a carrier readable by a computing system and encoding a computer program of instructions for executing a computer process.
- FIG. 1 is a network diagram showing aspects of an illustrative operating environment for embodiments presented herein;
- FIG. 2 is a computer architecture diagram showing a computer architecture suitable for implementing a computer system or networking device as described herein;
- FIG. 3 is a flow diagram illustrating a process for configuring a power line networking device in one implementation described herein;
- FIG. 4 is a flow diagram illustrating a process for configuring a second power line networking device in another implementation described herein;
- FIG. 5 is a flow diagram showing an illustrative process for configuring a power line networking device in another implementation.
- FIGS. 6-9 are flow diagrams illustrating various processes for the configuration of legacy power line networking devices according to several implementations presented herein.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types.
- program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types.
- program modules may be located in both local and remote memory storage devices. It should be appreciated, however, that the implementations described herein may also be utilized in conjunction with stand-alone computer systems and other types of computing devices.
- HOMEPLUG is a specification for technology that connects devices to each other through the power lines in a home.
- HOMEPLUG-certified products connect personal computers and other devices that utilize Ethernet, USB, and wireless technologies to the power line via a HOMEPLUG bridge or adapter.
- the term “HOMEPLUG” includes both the HOMEPLUG 1.0 and HOMEPLUG AV specifications and devices compatible therewith.
- Devices compatible with the HOMEPLUG 1.0 standard are configured for speeds up to 14 Mbit/s while devices compatible with the HOMEPLUG AV standard are capable of speeds greater than 100 Mbit/s.
- HOMEPLUG AV devices are compatible with HOMEPLUG 1.0 devices. It should be appreciated that although the embodiments presented herein are described in the context of HOMEPLUG-compatible devices and networks, the embodiments described herein may be utilized with other types of power line networking devices compatible with other standards.
- the HOMEPLUG AV specification defines two levels of security: low-level security and lock-down security.
- Low-level security is instantiated by the mating of two devices through a HOMEPLUG AV pushbutton that acts at the HOMEPLUG media access control (“MAC”) layer.
- MAC media access control
- This low-cost method is expected to be adopted by consumer electronics that do not have an internet protocol (“IP”) stack, interface or a display, such as self-powered speakers.
- IP internet protocol
- Lock-down security is implemented by all HOMEPLUG AV devices that are capable of an out-of-band encryption key exchange.
- a strong encryption key is exchanged out-of-band, such as through user entry, Flash Configuration, or a WINDOWS CONNECT NOW (“WCN”) personal identification number (“PIN”) or pushbutton.
- WCN WINDOWS CONNECT NOW
- PIN personal identification number
- WCNv2 The WCN version 2 (“WCNv2”) protocol defines a key exchange mechanism between devices that have not yet been admitted to the network.
- Devices that incorporate HOMEPLUG AV transceivers can interact with the WINDOWS VISTA operating system from MICROSOFT CORPORATION of Redmond, Wash. to create secure local area networks (“LANs”) and wireless LANs (“WLANs”).
- LANs secure local area networks
- WLANs wireless LANs
- each HOMEPLUG AV device will have a Device Password (“DPW”) printed on the bottom of the device that can be used to enter the device into a lock-down network.
- DGW Device Password
- a device in low-level security mode can be brought into Lock-down security mode in three ways: First, another station on the power line may bring a HOMEPLUG device into the lock-down network by using the DPW of the new device; second, a personal computer (“PC”) host on the trusted (in this example, non-power line) side of the HOMEPLUG AV transceiver may provide a lock-down key to the device; third, the embedded host processor (non-power line in this example) incorporated into the HOMEPLUG AV transceiver may give the transceiver a lock-down key obtained through Flash Configuration or WCN, including a WCN Pushbutton.
- PC personal computer
- HOMEPLUG AV WCN is a protocol that allows LAN and WLAN devices to take the WEP key, the WPA key, or a WPA version two encryption key utilized to secure the WLAN and also configure the HOMEPLUG AV network.
- the protocol assumes that the interaction with the operating system of the PC is defined, and must operate without requiring new behavior by the operating system. However, the protocol also defines messages that a HOMEPLUG AV WCN device should forward to a host PC to allow an application or future operating system handler or service to further improve the HOMEPLUG AV network configuration experience.
- HOMEPLUG AV networks have names called Human Friendly Identifiers (“HFID”).
- HFID Human Friendly Identifiers
- a HOMEPLUG AV networking device, or station may see other stations with other HFIDs even though the stations may not be associated with each other or capable of forwarding IP traffic between devices.
- Unassociated stations are capable of communicating a limited amount of data to each other through a HOMEPLUG AV mechanism known as the Encrypted Payload MAC Management Entry (“MME”).
- MME Encrypted Payload MAC Management Entry
- HOMEPLUG AV WCN stations should encapsulate WCN discovery information in the Encrypted Payload MME and deliver this information to other stations.
- Upon receipt, a station should de-encapsulate the WCN discovery information and forward it to its host. This mechanism allows the WINDOWS VISTA operating system from MICROSOFT CORPORATION or another compatible operating system to discover new HOMEPLUG AV devices and to admit them to the network using the WCN protocol. This process is described in greater detail below
- the IEEE 2004 Bridge Specification describes an architecture for the interconnection of IEEE 802 LANs below the MAC service boundary. This specification is available from the Institute of Electrical and Electronics Engineers, Inc. Whitepapers, specification details, and other information describing the WCNv2 protocol are available from MICROSOFT CORPORATION of Redmond, Wash.
- the HOMEPLUG AV specification is available from the HOMEPLUG POWER ALLIANCE. Each of these sources is incorporated by reference herein in their entirety.
- FIG. 1 shows aspects of an illustrative operative environment for the subject matter described herein.
- the illustrative operating environment shown in FIG. 1 includes one or more HOMEPLUG-enabled power line networking devices 104 A- 104 B.
- Each of the power line networking devices 104 A- 104 B includes power line networking hardware and may also include a wireless access point and/or a wired router or bridge.
- the device 104 B includes the power line component 112 B and a wired network component 116 .
- the device 104 A includes the power line component 112 A and a wireless access point 114 .
- a HOMEPLUG gateway is a single device, such a gateway could be physically implemented as one, two, or more devices.
- the devices 104 A- 104 B are operative to communicate with one another via the power lines 110 A- 110 B.
- a power line network 108 is created utilizing existing power line infrastructure.
- Other devices may utilize the power line network 108 by connected to one of the devices 104 A- 104 B through either a wired connection or through a wireless network 106 created by the wireless access point 114 .
- a wireless equipped laptop computer 102 may connect to the wireless access point 114 .
- the laptop 102 is executing the WINDOWS VISTA operating system from MICROSOFT CORPORATION and can associate with the wireless access point 114 utilizing WCNv2.
- WCNv2 is one mechanism used by the WINDOWS VISTA operating system for the configuration of devices. This document describes how WCNv2 enabled devices that incorporate a HOMEPLUG AV transceiver, such as the power line component 112 A, are configured.
- each of the devices 104 A- 104 B must be configured with a number of security settings.
- a consumer that purchases a first pair of devices to enable power line networking.
- One device in the pair is attached to the laptop 102 and the other device is attached via a wired connection to an Ethernet port on a gateway or other device.
- the gateway may be stand-alone or a switch collapsed into a router or access point.
- nothing will occur when the first HOMEPLUG device (on the PC or router side) is connected.
- the second HOMEPLUG device is plugged in, however, the new connection is automatically detected.
- a setup wizard, or configuration application, executing on the laptop 102 will prompt the user for the device PIN, create the WLAN settings, and configure the wireless access point 114 using the provided settings.
- the device In order to configure the power line portion of the new device, the device (and/or the configuration application executing on the laptop 102 ) creates unique HOMEPLUG-compatible power line network settings based on the wireless encryption key. The created power line network settings are then utilized to configure both of the newly-added HOMEPLUG devices. If the consumer later adds a HOMEPLUG enabled device to the existing network, the device is automatically detected. The user then enters the PIN from the label on the new device and the new device is configured with the same settings as the other HOMEPLUG devices.
- FIG. 2 shows an illustrative computer architecture for a computing device 200 .
- This computer architecture may be utilized to embody the computer systems illustrated in and discussed above with reference to FIG. 1 .
- the computer architecture shown in FIG. 2 may be utilized to implement the laptop computer 102 , a power line networking device 104 , and any other computer systems discussed herein.
- the computer architecture shown in FIG. 2 embodies a standard laptop, desktop computer, or server computer, other types of computer architectures and computing devices may be utilized.
- the subject matter described herein may be utilized with a conventional desktop or “personal” computer, a laptop computer, a handheld or portable computing device, a server computer, a wireless handset, such as a cellular or PCS telephone, a personal digital assistant, a custom hardware device, and virtually any other type of computing device.
- the computer architecture shown in FIG. 2 includes a central processing unit 202 (“CPU”), a system memory 204 , including a random access memory 206 (“RAM”) and a read-only memory (“ROM”) 208 , and a system bus 210 that couples the memory to the CPU 202 .
- the computing device 200 further includes a mass storage device 212 for storing an operating system 214 , application programs, and other program modules, which will be described in greater detail below.
- the mass storage device 212 is connected to the CPU 202 through a mass storage controller 216 connected to the bus 210 .
- the mass storage device 212 and its associated computer-readable media provide non-volatile storage for the computing device 200 .
- computer-readable media can be any available media that can be accessed by the computing device 200 .
- Computer-readable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), HD-DVD, BLU-RAY, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computing device 200 .
- the computing device 200 may operate in a networked environment using logical connections to remote computers through a network 201 , such as the Internet.
- the computing device 200 may connect to the network 201 through a network interface unit 218 connected to the bus 210 . It should be appreciated that the network interface unit 218 may also be utilized to connect to other types of networks and remote computer systems.
- the computing device 200 may also include a wireless network interface 220 for connecting to a wireless network 106 . As shown in FIG. 2 , the wireless network 106 may provide a gateway for connecting to the network 201 .
- the wireless network interface 220 may be embodied as an add-on card for the computing device 200 , such as a PCMCIA adapter card, or may be physically integrated with the other components making up the computing device 200 .
- the wireless network interface 220 may also be compatible with various wireless networking standards.
- the wireless network interface 220 comprises a card compatible with the IEEE 802.11b and IEEE 802.11g networking standards.
- the wireless network interface 220 may also be compatible with current or future long range wireless networking standards, such as WIMAX. It should be appreciated that the embodiments described herein may be utilized with virtually any wireless networking standard or protocol.
- the computing device 200 may also include an input/output controller 224 for receiving and processing input from a number of other devices, including a keyboard, mouse, or electronic stylus (not shown in FIG. 2 ). Similarly, an input/output controller 224 may provide output to a display screen, a printer, or other type of output device (also not shown in FIG. 2 ).
- a number of program modules and data files may be stored in the mass storage device 212 and RAM 206 of the computing device 200 , including an operating system 214 suitable for controlling the operation of a networked personal computer, such as the WINDOWS VISTA operating system from MICROSOFT CORPORATION of Redmond, Wash. Other operating systems may also be utilized, such as the LINUX operating system, the OSX operating system from APPLE COMPUTER, INC, and others.
- the mass storage device 212 and RAM 206 may also store one or more program modules.
- the mass storage device 212 and the RAM 206 may store a configuration application 216 (also referred to herein as a “wizard”).
- the operating system 214 is operative to discover unconfigured networking devices, such as unconfigured power line networking devices.
- the configuration application 216 is operative to utilize the contents of a wireless network profile 218 containing network settings for the wireless network 206 to generate a power line network profile 220 .
- the contents of the power line network profile 220 are then utilized to configure the power line networking devices. It should be appreciated that the process of converting the wireless network settings to the power line network settings may be performed by a computer connected to the power line network or by the power line networking device itself.
- TABLE 1 illustrates the parameters used in WCNv2 and how these parameters are mapped to equivalent HOMEPLUG parameters in one implementation presented herein.
- each HOMEPLUG 1.0 power line networking device contains a Network Encryption Key (“NEK”).
- NEK Network Encryption Key
- hash function e.g. Message-Digest Algorithm 5 (“MD5”) for HOMEPLUG 1.0
- MD5 Message-Digest Algorithm 5
- the default network key is eight bytes for HOMEPLUG 1.0 and HOMEPLUG TURBO and 16 bytes for HOMEPLUG AV. Almost all HOMEPLUG devices ship with the default NEK.
- HOMEPLUG TURBO and HOMEPLUG AV devices can have eight simultaneous keys, allowing them to poll the “HomePlug” default network to discover new devices while simultaneously communicating on a private network.
- HOMEPLUG 1.0 devices can use only one NEK. These devices must stop the private network to poll the default network for new devices.
- HOMEPLUG devices trust the local (non-power line) traffic they receive and will accept a new NEK from the local network without further authentication. HOMEPLUG devices do not trust other devices on the power line to give them a new NEK without authentication. Each HOMEPLUG device also contains a second, unique, randomly generated key called a Device Encryption Key (“DEK”). The DEK is generated from a unique device password that is printed on the label of each device.
- DEK Device Encryption Key
- a HOMEPLUG device will accept a new NEK from the power line if it is received encrypted with the DEK from the device. Any device can accept a new NEK from its host (a processor on its non-power line interface). For power line chips embedded in WCNv2 enabled devices, there will always be a host processor performing WCNv2 that can pass the new NEK down to the power line. In some cases, devices may need to change their NEK back to the default key to discover new HOMEPLUG devices.
- Non-WCNv2 legacy power line devices can have their device passwords used in exactly the same manner as a PIN. Future non-WCNv2 power line devices can have their device password standard changed from 25 random alphanumeric characters to 8 or 9 numeric characters to match the WCNv2 pin format. For a complete solution, the mechanism to connect to a legacy power line device remotely using its DEK may be incorporated into WCNv2.
- FIG. 3 one HOMEPLUG AV WCNv2 use scenario will be described.
- the logical operations described herein are implemented (1) as a sequence of computer implemented acts or program modules running on a computing system and/or (2) as interconnected machine logic circuits or circuit modules within the computing system.
- the implementation is a matter of choice dependent on the performance requirements of the computing system.
- the logical operations described herein with respect to are referred to variously as operations, structural devices, acts, or modules. These operations, structural devices, acts and modules may be implemented in software, in firmware, in special purpose digital logic, and any combination.
- a registrar such as the laptop 102 communicates with a wireless enabled power line networking device, such as the device 104 A.
- the registrar may comprise a personal computer or other type of computing device capable of granting access to devices on a network.
- the device 104 A comprises a HOMEPLUG AV device with a HOMEPLUG AV device password, HOMEPLUG AV WCNv2 PIN, and a HOMEPLUG AV push button.
- the routines 300 and 350 illustrate the processing operations performed in order to configure the device 104 A for operation on the power line network.
- the routine 300 begins at operation 302 , where the registrar discovers that the power line networking device 104 A is unconfigured. In response, the routine 300 continues to operation 304 , where a user is requested to enter the PIN printed on the networking device 104 A. The user enters the PIN at operation 352 of the routine 350 . Once the user has done entered the PIN, the new device 104 A is registered at operation 306 of the routine 300 and at operation 353 of the routine 350 .
- the registrar transmits the wireless network settings contained in the existing wireless profile stored at the registrar to the power line networking device 104 A at operation 308 .
- the device 104 A receives the wireless network settings at operation 356 .
- the device 104 A generates power line network settings from the received wireless network settings.
- the generated power line network settings are then applied to configure the device.
- the registrar may perform the process of converting the wireless network settings to power line network settings. In this scenario, the registrar transmits the power line network settings to the device 104 A following conversion.
- a new network is started by the device 104 A if it is not associated with a pre-existing network.
- the routines 300 and 350 end at operations 312 and 362 , respectively. Additional details regarding an illustrative process for converting wireless network settings to equivalent power line network settings will be provided below with respect to FIG. 5 .
- a new WCNv2 message type may be created and utilized to transmit the wireless network settings to the device 104 A.
- the new message type instructs the device 104 A that wireless network settings are being transmitted.
- the device 104 A understands that the settings must be converted to equivalent power line network settings.
- the power line device includes a wireless access point 114
- the wireless network settings can be transmitted directly to the device using a standard message type and converted for use with the power line network.
- no new message type is needed to transfer the power line network settings to the device 104 A
- FIG. 4 another HOMEPLUG AV WCNv2 use scenario will be described.
- a second power line communications device 104 B is being added to the network configuration shown in FIG. 3 .
- the device 104 B comprises a HOMEPLUG AV device with a HOMEPLUG AV device password, HOMEPLUG AV WCNv2 PIN, and a HOMEPLUG AV push button in this example.
- the routine 400 begins at operation 402 , where the registrar discovers the new device 104 B.
- the user is requested to enter the PIN printed on the newly added power line device 104 B.
- the user enters the PIN at operation 452 and the PIN is received at the registrar at operation 404 .
- the new device 104 B is registered at operations 406 and 454 .
- the wireless network settings are transmitted from the registrar to the new device 104 B at operation 408 .
- the wireless network settings are received at the device 104 B at operation 456 .
- the device 104 B then converts the wireless network settings into power line network equivalent settings at operation 458 .
- the new device 104 B joins the existing network using the newly converted power line network settings. As discussed above, the conversion process may alternatively take place at the registrar. Additional details regarding an illustrative process for converting wireless network settings to equivalent power line network settings will be provided below with respect to FIG. 5 .
- the routine 500 begins at decision operation 502 , where a determination is made as to whether a wireless network profile 218 currently exists at the computing system 200 . If a wireless profile 218 does exist, the routine 500 branches to operation 504 , where the wireless network settings are retrieved from the wireless profile 218 . If a wireless profile does not exist, the routine 500 continues from operation 502 to operation 506 .
- the wireless network settings are received from a user. For instance, a network name may be received and utilized as the SSID for the wireless network. An encryption key for the wireless network may also be received from the user. A new wireless profile 218 is created by the computing system 200 using these settings. The routine 500 then continues to operation 508 where the wireless settings are applied to the wireless network.
- the routine 500 continues to operation 510 , where the power line network settings are generated from the wireless network settings to create a power line network profile 220 . As discussed above, this may occur at the computing system 200 or at the power line networking device itself.
- the configuration information from a WCN registrar is converted into HOMEPLUG AV configuration parameters. This process is described in detail below.
- One portion of the process of converting wireless network settings to wire line network settings involves converting a wireless network key into a HOMEPLUG AV NMK.
- WPAv2, WPA, or WEP key into a HOMEPLUG AV NMK
- the following process is performed in one implementation.
- the WPAv2, WPA, and WEP keys are represented as an ASCII string of hexadecimal (“HEX”) characters and then treated as a HOMEPLUG AV password (the NPW).
- the length of the password is between 12 and 64 characters, inclusive.
- Wireless keys shorter than 12 characters are padded to 12 characters with the ASCII character “zero” (ASCII[48]) trailing the ASCII key.
- the HOMEPLUG AV privacy function generates a HOMEPLUG AV encryption key (NMK) from the network password (NPW) using Lock-Down mode.
- the mechanism for creating a key from a password is the Password-Based Key Derivation Function 1 (“PBKDF1”) function, as shown in the PKCS #5 v2.0 standard, Password-based Cryptography Standard, using SHA-256 as the underlying hash algorithm.
- PBKDF1 Password-Based Key Derivation Function 1
- the iteration count used to calculate the key when associated with Lock-Down Mode or a DAK is 999, and for Unprotected or User-Confirm Mode it is 1000.
- the salt value is 0x0885 6DAF 7CF5 8185.
- the leftmost 16 octets of the SHA-256 output (as described in FIPS-180-2 change notice) shall be used as the AES encryption key.
- the first octet of the output corresponds to octet 0 of the AES encryption key.
- the bit ordering of the AES encryption key within an octet is dependent on where it is used.
- HOMEPLUG AV passwords (DPW and NPW) are limited to strings of ASCII characters chosen from the range ASCII[32] to ASCII[127]. The length of a password is between 12 and 64 characters inclusive. Passwords are not sent to the HOMEPLUG AV convergence layer (“CL”) and it is recommended that they not be retained. It is also recommended that DPWs be a minimum of 15 characters long and NPWs a minimum of 24 characters long.
- the WPAv2, WPA, and WEP keys are represented as ASCII string of HEX characters and then treated as a HOMEPLUG 1.0 NPW. Keys shorter than four characters are padded to four characters with the ASCII character “zero” (ASCII[48]) trailing the ASCII key. Keys longer than 24 characters are truncated to the first 24 characters. Hexadecimal values “A-F” are represented in lower case and no leading or trailing indicators of hexadecimal values (such as 0x) are used.
- the HOMEPLUG 1.0 privacy function generates a HOMEPLUG 1.0 NEK from the NPW.
- the mechanism for creating a key from a password is the PBKDF1 function as shown in the PKCS #5 v2.0 standard, Password-based Cryptography Standard, using MD5 as the underlying hash algorithm.
- the iteration count used to calculate the key is 1000.
- the salt value is 0x0885 6DAF 7CF5 8185.
- the first eight octets of the MD5 output are forced to odd parity to meet the odd parity requirements of FIPS PUB 46-3.
- the low-order bit (least significant) of each octet is modified to force odd parity.
- the high-order (most significant) bit of the seventh octet of the parity-corrected output corresponds to bit 1 of the DES encryption key as defined in FIPS PUB 46-3.
- HOMEPLUG passwords shall be limited to strings of ASCII characters chosen from the range ASCII[32] to ASCII[127].
- the length of a password shall be between four and twenty four characters, inclusive.
- the conversion logic from SSID to HFID is as follows.
- SSID supports up to 32 extended ASCII characters.
- a HOMEPLUG AV STA actually has three HFIDs.
- the third (user controlled) HFID is mapped to the SSID.
- An HFID can be up to 64 extended ASCII characters and is terminated by a null character. All 64 characters may be used and a trailing null implied.
- To map an SSID to an HFID a copy is utilized. If the SSID is 32 characters, then it is null terminated when placed in the HFID. For example, a 32 character SSID should simply append a null character ASCII(0) to the end of the string and then be copied into the user controlled HFID. SSIDs are never padded during conversion to HFIDs.
- the routine 500 continues to operation 512 , where the power line network settings are applied to the unconfigured power line network device. It should be appreciated that the process illustrated in FIG. 5 may be performed in response to the detection of an unconfigured power line network device or in response to a user request to change the security settings on the wireless or power line networks. From operation 512 , the routine 500 continues to operation 514 , where it ends.
- FIGS. 6 and 7 show several HOMEPLUG AV legacy use scenarios.
- the HOMEPLUG AV devices do not incorporate the WCN protocol.
- a HOMEPLUG AV application or WINDOWS VISTA operating system handler must configure the legacy devices. All HOMEPLUG devices ship with a vendor customized configuration application for down level support. The function of these applications could also be performed by a WINDOWS VISTA handler.
- the device 104 A comprises a wireless HOMEPLUG AV device with a HOMEPLUG AV device password (DAK) for configuration.
- the routine 600 begins at operation 602 , where the handler application is initiated on the registrar.
- the routine 600 then continues to operation 604 , where the handler polls the network for new devices.
- the routine 600 continues to operation 606 , where the new device 104 A is registered.
- the registrar Once the new device 104 A has been registered, the registrar generates power line network settings from the wireless network settings. This occurs at operation 608 . Details regarding an illustrative process for converting wireless network settings to equivalent power line network settings were discussed above with respect to FIG. 5 .
- the generated power line network settings are then transmitted to the new device 104 A at operation 610 .
- the new device 104 A receives the settings and configures itself at operation 654 .
- a new network is started if the new device 104 A is not associated with a pre-existing network.
- the routines 600 and 650 end at operations 614 and 658 , respectively.
- FIG. 7 another HOMEPLUG AV use scenario will be described.
- a second power line communications device 104 B is being added to the network configuration shown in FIG. 3 .
- the device 104 B comprises a HOMEPLUG AV device with a HOMEPLUG AV device password (DAK) for configuration.
- the device 104 B is not WCN compatible.
- the routine 700 begins at operation 702 , where the handler is initiated.
- the routine 700 then continues to operation 704 , where the HOMEPLUG AV DAK from the device is entered into the handler.
- the routine 700 then continues to operation 704 , where the handler polls for new devices.
- the routine 700 continues to operation 708 , where the new device 104 B is registered.
- the registrar Once the new device 104 B has been registered, the registrar generates power line network settings from the wireless network settings. This occurs at operation 710 . Details regarding an illustrative process for converting wireless network settings to equivalent power line network settings were discussed above with respect to FIG. 5 .
- the generated power line network settings are then transmitted to the new device 104 B at operation 712 .
- the new device 104 B receives the settings and configures itself at operation 754 .
- the new device 104 B joins the existing network that includes the device 104 A.
- the routines 700 and 750 end at operations 714 and 758 , respectively.
- FIGS. 8 and 9 illustrate several HOMEPLUG AV pushbutton legacy use scenarios.
- the HOMEPLUG AV pushbutton devices 104 A- 104 B do not incorporate the WCN protocol.
- the pushbutton on the devices implements only the low-security HOMEPLUG AV pushbutton mechanism, not WCN.
- the HOMEPLUG AV pushbutton can no longer be used.
- the user must be prompted to enter the DAK of each HOMEPLUG AV pushbutton device.
- the placement of a DAK on each device is mandatory. This requirement is regardless of the election to add the optional pushbutton, so all HOMEPLUG AV pushbutton devices will have a DAK.
- the legacy setup illustrated in FIGS. 8 and 9 can occur regardless of the use of WCN in the HOMEPLUG AV network.
- the HOMEPLUG AV pushbutton is optional, whenever a HOMEPLUG AV network is composed of pushbutton and non-HOMEPLUG AV pushbutton devices, all of the devices much be configured using their DAKs or with some other out-of-band mechanism.
- the device 104 A comprises a wireless HOMEPLUG AV device with a HOMEPLUG AV device password (DAK) and a HOMEPLUG AV push button for configuration.
- the routine 800 begins at operation 802 , where the handler application is initiated on the registrar in response to a user request or a push button event.
- the routine 800 then continues to operation 804 , where the handler polls the network for new devices.
- the routine 800 continues to operation 806 , where the handler requires the HOMEPLUG AV DAK from the newly discovered device 104 A.
- the new device 104 A is registered at operation 808 .
- the registrar Once the new device 104 A has been registered, the registrar generates power line network settings from the wireless network settings at operation 810 . Details regarding an illustrative process for converting wireless network settings to equivalent power line network settings were discussed above with respect to FIG. 5 .
- the generated power line network settings are then transmitted to the new device 104 A at operation 812 .
- the new device 104 A receives the settings and configures itself at operation 856 .
- a new network is started if the new device 104 A is not associated with a pre-existing network.
- the routines 800 and 850 end at operations 816 and 860 , respectively.
- FIG. 9 another HOMEPLUG AV use scenario will be described.
- a second power line communications device 104 B is being added to the network configuration shown in FIG. 3 .
- the device 104 B comprises a HOMEPLUG AV device with a HOMEPLUG AV device password (DAK) for configuration and a HOMEPLUG AV push button for configuration.
- DAK HOMEPLUG AV device password
- the device 104 B is not WCN compatible.
- the routine 900 begins at operation 902 , where the handler is initiated by a user event or selection of the HOMEPLUG AV push button on the device 104 B.
- the routine 900 then continues to operation 904 , where the handler polls for new devices.
- the handler requests the HOMEPLUG AV DAK from the newly discovered device 104 B.
- a response is provided including the HOMEPLUG AV DAK at operation 952 .
- the routine 900 then continues to operation 908 , where the new device 104 B is registered.
- the registrar Once the new device 104 B has been registered, the registrar generates power line network settings from the wireless network settings at operation 910 . Details regarding an illustrative process for converting wireless network settings to equivalent power line network settings were discussed above with respect to FIG. 5 .
- the generated power line network settings are then transmitted to the new device 104 B at operation 912 .
- the new device 104 B receives the settings and configures itself at operation 956 .
- a new network is started if the newly added device 104 B is not currently associated with a network.
- the routines 900 and 950 end at operations 916 and 960 , respectively.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
TABLE 1 | ||
Equivalent HOMEPLUG | Equivalent HOMEPLUG | |
WCNv2 parameter | 1.0 parameter | AV parameter |
Service Set Identifier | Network Password | STA Human Friendly ID |
(“NPW”) (see note 1) | ||
Basic Service Set | Network Password | HOMEPLUG AV Logical |
(see note 1) | Network (“AVLN”) Human | |
Friendly ID | ||
Extended Service Set | Network Password | Human Friendly ID |
(“ESS”) | (see note 1) | |
WCN PIN | Device Password | Device Password (“DPW”) |
Pre-Shared Key Passphrase | Network Password | Network Password |
WPAv2 pre-shared Key | Network Encryption Key | Network Membership Key |
(IEEE802.11i) | (“NMK”) | |
WPA Key | Network Encryption Key | Network Membership Key |
WEP Key (standard 64-bit | Network Encryption Key | Network Membership Key |
WEP using a 40 bit key) | ||
WEP Key (extended 128-bit | Network Encryption Key | Network Membership Key |
WEP protocol using a 104- | ||
bit key) | ||
WEP Key (extended 256-bit | Network Encryption Key | Network Membership Key |
WEP protocol using a 232- | ||
bit key) | ||
Note 1: | ||
The HOMEPLUG 1.0 Network Password hashes to the Network Key and is therefore equivalent to a non-announced SSID. |
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/584,929 US8270934B2 (en) | 2006-05-22 | 2006-10-23 | Configuring network settings for a power line networking device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US80242406P | 2006-05-22 | 2006-05-22 | |
US11/584,929 US8270934B2 (en) | 2006-05-22 | 2006-10-23 | Configuring network settings for a power line networking device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070271398A1 US20070271398A1 (en) | 2007-11-22 |
US8270934B2 true US8270934B2 (en) | 2012-09-18 |
Family
ID=38713252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/584,929 Expired - Fee Related US8270934B2 (en) | 2006-05-22 | 2006-10-23 | Configuring network settings for a power line networking device |
Country Status (1)
Country | Link |
---|---|
US (1) | US8270934B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120158919A1 (en) * | 2010-12-16 | 2012-06-21 | Google Inc. | Changing device configuration based on machine-readable codes |
Families Citing this family (124)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6658091B1 (en) | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US8635350B2 (en) | 2006-06-12 | 2014-01-21 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US8988221B2 (en) | 2005-03-16 | 2015-03-24 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11190578B2 (en) | 2008-08-11 | 2021-11-30 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US9609003B1 (en) | 2007-06-12 | 2017-03-28 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US20170118037A1 (en) | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US12063220B2 (en) | 2004-03-16 | 2024-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US9191228B2 (en) | 2005-03-16 | 2015-11-17 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US9141276B2 (en) | 2005-03-16 | 2015-09-22 | Icontrol Networks, Inc. | Integrated interface for mobile device |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US7711796B2 (en) | 2006-06-12 | 2010-05-04 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US8963713B2 (en) | 2005-03-16 | 2015-02-24 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US20160065414A1 (en) | 2013-06-27 | 2016-03-03 | Ken Sundermeyer | Control system user interface |
GB2428821B (en) | 2004-03-16 | 2008-06-04 | Icontrol Networks Inc | Premises management system |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US9450776B2 (en) | 2005-03-16 | 2016-09-20 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US20170180198A1 (en) * | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US12063221B2 (en) | 2006-06-12 | 2024-08-13 | Icontrol Networks, Inc. | Activation of gateway device |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US8769637B2 (en) * | 2007-03-23 | 2014-07-01 | Sap Ag | Iterated password hash systems and methods for preserving password entropy |
JP2008270999A (en) * | 2007-04-18 | 2008-11-06 | Sony Corp | Communicating system and communication equipment |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US9521090B2 (en) * | 2007-06-04 | 2016-12-13 | Qualcomm Incorporated | Authorizing stations into a centrally managed network |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US12283172B2 (en) | 2007-06-12 | 2025-04-22 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US12184443B2 (en) | 2007-06-12 | 2024-12-31 | Icontrol Networks, Inc. | Controlling data routing among networks |
US12003387B2 (en) | 2012-06-27 | 2024-06-04 | Comcast Cable Communications, Llc | Control system user interface |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US20090164644A1 (en) * | 2007-12-19 | 2009-06-25 | Ulf Soderberg | Wireless security configuration system and method |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
KR100976182B1 (en) * | 2008-03-05 | 2010-08-17 | 한국전자통신연구원 | Charging device for electric vehicle and power line magnetic field communication method using same |
US8295301B2 (en) * | 2008-06-16 | 2012-10-23 | Qualcomm Atheros, Inc. | Managing coexistence among signaling protocols on a shared medium |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US8344874B2 (en) * | 2008-07-10 | 2013-01-01 | Apple Inc. | Intelligent power-enabled communications port |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US9628440B2 (en) | 2008-11-12 | 2017-04-18 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US8212376B2 (en) * | 2008-11-14 | 2012-07-03 | Radioshack Corporation | Apparatus and method for providing operative power to powerline-network device |
US8238552B2 (en) * | 2009-02-13 | 2012-08-07 | Guidance Software, Inc. | Password key derivation system and method |
US20100283587A1 (en) * | 2009-03-12 | 2010-11-11 | Kukulies Fredrick W | Device for testing of a powerline communications audio system |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
DE202009013003U1 (en) * | 2009-08-23 | 2011-01-05 | Aizo Ag Deutschland | Data transmission network |
EP2290880A1 (en) * | 2009-08-23 | 2011-03-02 | Aizo AG | Data transmission network |
FR2949928A1 (en) * | 2009-09-08 | 2011-03-11 | Thomson Licensing | TRANSMITTING METHOD IMPLEMENTED BY A NODE AND CORRESPONDING RECEIVING METHOD |
US8552844B2 (en) * | 2010-02-08 | 2013-10-08 | Sigma Designs Israel S.D.I Ltd | Pairing PLC devices |
EP2569712B1 (en) | 2010-05-10 | 2021-10-13 | Icontrol Networks, Inc. | Control system user interface |
TWI411345B (en) * | 2010-08-20 | 2013-10-01 | Wu Sheng Huang | Plug-and-play wireless network extension system and method of automatic connection for the same |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
US9019864B2 (en) * | 2011-02-14 | 2015-04-28 | General Electric Company | System and method of wireless enabled device configuration over an advanced metering infrastructure (AMI) |
US8745695B2 (en) * | 2011-03-14 | 2014-06-03 | Qualcomm Incorporated | Hybrid networking master passphrase |
WO2012145627A2 (en) * | 2011-04-20 | 2012-10-26 | The Research Foundation Of State University Of New York | Electrical power regulating and monitoring systems and outlet systems therefor |
US9048906B2 (en) * | 2011-05-03 | 2015-06-02 | Broadcom Corporation | Beamforming precoding matrix using non-uniform angles quantization |
US9407453B2 (en) * | 2011-08-07 | 2016-08-02 | Econet (Suzhou) Limited | Method of medium access control type detection |
JP6019950B2 (en) * | 2011-09-13 | 2016-11-02 | ソニー株式会社 | Power supply apparatus and method, and program |
EP2605566B1 (en) * | 2011-12-12 | 2019-06-12 | Sony Corporation | System for transmitting a data signal in a network, method, mobile transmitting device and network device |
CN104365128B (en) * | 2012-04-11 | 2019-06-04 | 西门子公司 | Method and apparatus for running a technology-specific button configuration session |
US9191070B2 (en) | 2012-10-26 | 2015-11-17 | Qualcomm Incorporated | Multi-instance powerline communication system |
US9928975B1 (en) | 2013-03-14 | 2018-03-27 | Icontrol Networks, Inc. | Three-way switch |
US9867143B1 (en) | 2013-03-15 | 2018-01-09 | Icontrol Networks, Inc. | Adaptive Power Modulation |
US9287727B1 (en) | 2013-03-15 | 2016-03-15 | Icontrol Networks, Inc. | Temporal voltage adaptive lithium battery charger |
CN103324510A (en) * | 2013-07-10 | 2013-09-25 | 中怡(苏州)科技有限公司 | EoC product upgrading method based on HomePlug AV chip |
US9384611B2 (en) * | 2013-07-26 | 2016-07-05 | Tyco Integrated Security, LLC | Method and system for self-discovery and management of wireless security devices |
WO2015021469A2 (en) | 2013-08-09 | 2015-02-12 | Icontrol Networks Canada Ulc | System, method and apparatus for remote monitoring |
US9244857B2 (en) * | 2013-10-31 | 2016-01-26 | Oracle International Corporation | Systems and methods for implementing low-latency lookup circuits using multiple hash functions |
US9342462B2 (en) | 2013-10-31 | 2016-05-17 | Oracle International Corporation | Systems and methods for implementing low-latency lookup circuits using sparse hash functions |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
KR101995828B1 (en) * | 2015-07-30 | 2019-07-04 | 엘에스산전 주식회사 | System for transmitting/receiveing data |
WO2020113042A1 (en) * | 2018-11-29 | 2020-06-04 | Coherent Logix, Inc. | Home power distribution with multiphase bridging |
CN111093248B (en) * | 2019-12-16 | 2022-04-15 | 北京小米移动软件有限公司 | Network distribution method, network distribution device and electronic equipment |
JP7699958B2 (en) * | 2021-05-26 | 2025-06-30 | キヤノン株式会社 | COMMUNICATION DEVICE, CONTROL METHOD FOR COMMUNICATION DEVICE, AND PROGRAM |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5838226A (en) * | 1996-02-07 | 1998-11-17 | Lutron Electronics Co.Inc. | Communication protocol for transmission system for controlling and determining the status of electrical devices from remote locations |
US6175860B1 (en) * | 1997-11-26 | 2001-01-16 | International Business Machines Corporation | Method and apparatus for an automatic multi-rate wireless/wired computer network |
US20030006881A1 (en) * | 2000-04-12 | 2003-01-09 | Reyes Ronald R. | System and method for power line communication |
US20040133689A1 (en) * | 2002-12-24 | 2004-07-08 | Samrat Vasisht | Method, system and device for automatically configuring a communications network |
US20050030946A1 (en) * | 2003-08-07 | 2005-02-10 | Carty Clark A. | Wireless-aware network switch and switch asic |
US6856799B1 (en) * | 1998-12-24 | 2005-02-15 | Swisscom Mobile Ag | Communications system, communication method and corresponding devices |
US20050254516A1 (en) * | 2000-04-19 | 2005-11-17 | Serconet, Ltd. | Network combining wired and non-wired segments |
US6987985B2 (en) * | 2003-06-06 | 2006-01-17 | Interdigital Technology Corporation | Wireless communication components and methods for multiple system communications |
US20060018328A1 (en) * | 2004-07-23 | 2006-01-26 | Comcast Cable Holdings, Llc | Method and system for powerline networking |
US20060294366A1 (en) * | 2005-06-23 | 2006-12-28 | International Business Machines Corp. | Method and system for establishing a secure connection based on an attribute certificate having user credentials |
US7457885B2 (en) * | 2005-02-10 | 2008-11-25 | Asoka Usa Corporation | Powerline communication system and method using coupler design for additional users |
-
2006
- 2006-10-23 US US11/584,929 patent/US8270934B2/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5838226A (en) * | 1996-02-07 | 1998-11-17 | Lutron Electronics Co.Inc. | Communication protocol for transmission system for controlling and determining the status of electrical devices from remote locations |
US6175860B1 (en) * | 1997-11-26 | 2001-01-16 | International Business Machines Corporation | Method and apparatus for an automatic multi-rate wireless/wired computer network |
US6856799B1 (en) * | 1998-12-24 | 2005-02-15 | Swisscom Mobile Ag | Communications system, communication method and corresponding devices |
US20030006881A1 (en) * | 2000-04-12 | 2003-01-09 | Reyes Ronald R. | System and method for power line communication |
US20050254516A1 (en) * | 2000-04-19 | 2005-11-17 | Serconet, Ltd. | Network combining wired and non-wired segments |
US20040133689A1 (en) * | 2002-12-24 | 2004-07-08 | Samrat Vasisht | Method, system and device for automatically configuring a communications network |
US6987985B2 (en) * | 2003-06-06 | 2006-01-17 | Interdigital Technology Corporation | Wireless communication components and methods for multiple system communications |
US20050030946A1 (en) * | 2003-08-07 | 2005-02-10 | Carty Clark A. | Wireless-aware network switch and switch asic |
US20060018328A1 (en) * | 2004-07-23 | 2006-01-26 | Comcast Cable Holdings, Llc | Method and system for powerline networking |
US7457885B2 (en) * | 2005-02-10 | 2008-11-25 | Asoka Usa Corporation | Powerline communication system and method using coupler design for additional users |
US20060294366A1 (en) * | 2005-06-23 | 2006-12-28 | International Business Machines Corp. | Method and system for establishing a secure connection based on an attribute certificate having user credentials |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120158919A1 (en) * | 2010-12-16 | 2012-06-21 | Google Inc. | Changing device configuration based on machine-readable codes |
Also Published As
Publication number | Publication date |
---|---|
US20070271398A1 (en) | 2007-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8270934B2 (en) | Configuring network settings for a power line networking device | |
US11200012B2 (en) | Terminal device, access point, communication device, and computer programs therefor | |
CN105723648B (en) | A kind of cipher key configuration mthods, systems and devices | |
CA2605682C (en) | Wireless device discovery and configuration | |
US10979412B2 (en) | Methods and apparatus for secure device authentication | |
JP4506856B2 (en) | Communication apparatus and communication method | |
US8924716B2 (en) | Communication device and communication method | |
US8375207B2 (en) | Method and apparatus for authenticating a network device | |
CN105684344B (en) | A kind of cipher key configuration method and apparatus | |
JP5120417B2 (en) | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM | |
CN101288063B (en) | Wireless device discovery and configuration | |
US10091650B2 (en) | Wireless terminal configuration method, device, and system | |
US20090274065A1 (en) | Method and apparatus for setting wireless local area network by using button | |
JP2019506049A (en) | Wireless communication system with multiple security levels | |
CN105636166A (en) | Method and apparatus for discovery between devices | |
US20090154701A1 (en) | On device number lock driven key generation for a wireless router in wireless network security systems | |
JP6570355B2 (en) | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM | |
US20230171097A1 (en) | Securely changing cryptographic strength during reconfiguration | |
JP6266397B2 (en) | COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL SYSTEM | |
US20250150262A1 (en) | Early indication for changing cryptographic strenght during configuration | |
TW202402077A (en) | Network allocation method for wireless communication device | |
BR112018013367B1 (en) | COMMUNICATION DEVICE, SERVICE SEEKING METHOD, AND SERVICE PROVIDING METHOD |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MANCHESTER, SCOTT;MENTZ, JAMES A.;AFTAB, YOUNUS;AND OTHERS;SIGNING DATES FROM 20110321 TO 20110404;REEL/FRAME:026094/0549 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034542/0001 Effective date: 20141014 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240918 |